"Anyone lies when the alternative is intolerable." – Maury Chaykin as Nero Wolfe Trusting humans is one of the most problematic points in the concern of security. For those not familiar, a good overview of VEX can be found here (PDF) on the NTIA.gov site. The value of VEX is clear: signal to consumers of …
Read MoreKubernetes is designed to be secured by default, and many of the built-in technologies and concepts are designed to ensure that is the case. Often times, the first exposure users will have to Kubernetes security will be to authentication and authorization: simply getting inside the cluster and being permitted to do …
Read More